Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 05:42

General

  • Target

    JaffaCakes118_81e404c97700d97eb4ed9274f84071f48ab947f297afac6367234995467c0c1b.iso

  • Size

    76KB

  • MD5

    a524114c369117af161305c725d30005

  • SHA1

    591a8945d2c2bc5a2babf185fd3d9b7cccc7ea1f

  • SHA256

    81e404c97700d97eb4ed9274f84071f48ab947f297afac6367234995467c0c1b

  • SHA512

    4901d5f48dbb08667b8357099cd5f477d57c7c26297a67beff16591a88689f2a822bee845eab7be540c9d5cc6a4abd92723a586a2af4dc96e31e8954a3f08e6a

  • SSDEEP

    384:U1rdNm05MJQo0UtDsIU0dUgpZENMsfyW2vJuxqge:U1JNm05orVSY3MynJuEge

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_81e404c97700d97eb4ed9274f84071f48ab947f297afac6367234995467c0c1b.iso
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\System32\isoburn.exe
      "C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_81e404c97700d97eb4ed9274f84071f48ab947f297afac6367234995467c0c1b.iso"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1752-24-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB